Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from 2017 Q2 Cybercrime Report

2017 Q2 Cybercrime Report

Cybercrime continues to grow, with organizations being attacked more than ever before. ThreatMetrix detected and stopped 144 million attacks this quarter and 300 million bot attacks. The complex, networked nature of cybercrime attacks can be seen in the following key trends analyzed this quarter: • The evolution of emerging economies in the cybercrime landscape as identity data trickles down to all regions of the globe following large-scale breaches • The regional variations in attack vector trends, with South America emerging as a hub for new account origination fraud • The emergence of highly organized criminal gangs targeting multiple organizations within the ThreatMetrix Network • The rise in mobile attack rates as attackers turn their attention towards the growing mobile economy

(more available)
Added: January 30, 2019
image from 2017 Q1 Cybercrime Report

2017 Q1 Cybercrime Report

The ThreatMetrix Cybercrime Report: Q1 2017 is based on actual cybercrime attacks from January – March 2017 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications. The Network provides visibility and insight into traffic patterns and emerging threats. The Network analyzes close to two billion transactions per month, over 45% of which originate from mobile devices. These transactions are analyzed for legitimacy based on hundreds of attributes, including device identification, geolocation, previous history and behavioral analytics. The Network and its real-time policy engine provide unique insight into users’ digital identities, even as they move between applications, devices, and networks. ThreatMetrix customers benefit from a global view of risks, based on these attributes and rules that are custom-tuned specifically for their businesses. Attacks discussed are from “high-risk” transactions scored by ThreatMetrix customers.

(more available)
Added: January 30, 2019
image from 2017 Gaming and Gambling Cybercrime Report

2017 Gaming and Gambling Cybercrime Report

This report offers these key insights: 49% of all transactions analyzed in gaming and gambling come from a mobile device, Identity spoofing remains the biggest threat to the industry, and Automated bot attacks can account for around half of daily gaming/gambling traffic during periods of peak attacks.

(more available)
Added: January 30, 2019
image from 2017 APAC Cybercrime Report

2017 APAC Cybercrime Report

This report offers insight into the Asia-Pacific region and the cybercrimes that are growing and continuing to occur in the area.

(more available)
Added: January 30, 2019
image from Q4 2016 CyberCrime Report

Q4 2016 CyberCrime Report

The ThreatMetrix Cybercrime Report: Q4 2016 is based on actual cybercrime attacks from October – December 2016 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from 2017 Cybercrime Report: Travel and Entertainment Industry DeepDive

2017 Cybercrime Report: Travel and Entertainment Industry DeepDive

This report from ThreatMetrix compiles their 2017 Cybercrime report in such a way that they offer unique insight into the travel and entertainment industry and how cybercrime is impacting that arena.

(more available)
Added: January 30, 2019
image from Q3 2016 CyberCrime Report

Q3 2016 CyberCrime Report

The ThreatMetrix Cybercrime Report: Q3 2016 is based on actual cybercrime attacks from July 2016 – September 2016 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Cybercrime Report: Gaming And Betting

Cybercrime Report: Gaming And Betting

Using intelligence from the ThreatMetrix Digital Identity Network, gaming and gambling companies can accurately differentiate between responsible users and problem gamblers / fraudsters in real time.

(more available)
Added: January 30, 2019
image from Q3 2016 Cybercrime Report APAC DeepDive

Q3 2016 Cybercrime Report APAC DeepDive

APAC continues to be an exciting region of huge growth, evolution and change; increasing its vulnerability to organized, global cyber attacks. This is particularly true given APAC has a particularly strong cross-border footprint, with a high proportion of digital transactions criss-crossing country boundaries. Cross-border transactions are considered riskier by most organizations, driven by the fact that they are far more likely to be automated bot attacks than domestic transactions, and attract higher instances of location spoofing, as fraudsters attempt to hide behind VPNs and proxies to mask their true location.

(more available)
Added: January 30, 2019
image from Q2 2016 Cybercrime Report

Q2 2016 Cybercrime Report

This is ThreatMetrix’s Report of events from the second quarter of 2016.

Added: January 30, 2019
image from Q2 2016 Cybercrime Report: Europe Deepdive

Q2 2016 Cybercrime Report: Europe Deepdive

This report from ThreatMetrix compiles the data from their 2016 Cybercrime report to provide insight into the threats in the European sector.

(more available)
Added: January 30, 2019
image from Q1 2016 Cybercrime Report

Q1 2016 Cybercrime Report

The ThreatMetrix Cybercrime Report: Q1 2016 is based on actual cybercrime attacks from January 2016 – March 2016 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Creating Value and Managing Risk in the World of PSD2

Creating Value and Managing Risk in the World of PSD2

Creating)Value)and)Managing)Risk)in)the)World)of)PSD2,“a"white"paper"developed"by"Aite"Group” in close cooperation with ThreatMetrix, provides insight into the key provisions of the revised & Payment(Service(Directive (PSD2) legislation and its impact on market practices.

(more available)
Added: January 30, 2019
image from Holiday Shopping Trends November 2018

Holiday Shopping Trends November 2018

This infographic offers illustrations that reveal data from the holiday shopping trends of 2018.

Added: January 30, 2019
image from 2017 Holiday Shopping

2017 Holiday Shopping

This report offers insight into global threats that occur during the Holiday shopping season.

Added: January 30, 2019
image from APT Group Profile: OilRig

APT Group Profile: OilRig

This report offers insight into OilRig an Iranian-linked Advanced Persistent Threat. It discusses who they are and why you should care.

(more available)
Added: January 25, 2019
image from The Q3 2017 Mobile Threat Landscape Report

The Q3 2017 Mobile Threat Landscape Report

The third quarter of 2017 saw an increase in the number of malicious apps flooding the mobile marketplace, the continued issues of imitation and trojan apps in official app stores, and the emergence of the WireX mobile botnet. In this report, they’ll give an overview of these mobile threats, as well as emerging trends they anticipate will be prevalent in Q4 and beyond to help you protect yourself and your customers.

(more available)
Added: January 25, 2019
image from The Q4 2017 Mobile Threat Landscape Report

The Q4 2017 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. The fourth quarter of 2017 showed a 37 percent decrease in blocklisted apps over Q3. Key threat trends include brand imitation, phishing, malware, and bankbot attacks on cryptocurrency users.

(more available)
Added: January 25, 2019
image from The Q3 2018 Mobile Threat Landscape Report

The Q3 2018 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. Q3 showed a nearly 220 percent increase in blocklisted apps over Q2. Due to a surge in total apps observed, the percentage of blocklisted apps dropped from 4% in Q2 to 3% in Q3.

(more available)
Added: January 25, 2019
image from The Q2 2018 Mobile Threat Landscape Report

The Q2 2018 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. Q2 showed a nearly 57 percent increase in blocklisted apps over Q1. Key threat trends include brand imitation, phishing, malware, malvertising scams crossing into the mobile realm, targetted attacks against MyEtherWallet, and the misuse of location data by major mobile providers.

(more available)
Added: January 25, 2019
image from The Q2 2017 Mobile Threat Landscape Report

The Q2 2017 Mobile Threat Landscape Report

In this report, we’ll give an overview of the recent mobile threats RiskIQ detected in Q2 of 2017, as well as emerging trends we anticipate will be prevalent in Q3 and beyond to help you protect yourself and your customers.

(more available)
Added: January 25, 2019
  • ««
  • «
  • 33
  • 34
  • 35
  • 36
  • 37
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 5, 2025 12:08 UTC (build b1d7be4)